DOMESTIC INTRUDER SYSTEM
Journal Title: Indian Journal of Computer Science and Engineering - Year 2011, Vol 2, Issue 4
Abstract
Throughout history, humans have sought to protect their life, property and possessions. In early societies, guards, watchdogs, traps and even noisemakers provided security. Fire was used to baffle wild animals and keep them at bay. As centuries passed and human accomplishments became more noteworthy, some rather engaging and sophisticated devices were developed to insure man's security. But until the discovery and harnessing of electricity, no device or protection scheme could be expected to provide any real degree of assurance or consistent peace of mind. Now when everything is available to us why not design something that provide us complete security .The very basic of this started with the simple alarm system and today it include capturing image , notifying suspicious activities etc.Commercially available Security systems are too expensive to be used by common population. We are trying to present a security system that provides all the facilities needed for security like activation of an alarm, capturing an image of intruder, along with sms and email notification at a very low cost.
Authors and Affiliations
B. Persis Urbana Ivy , G. Gaurav Modi
COMPARISON OF LOSSLESS DATA COMPRESSION ALGORITHMS FOR TEXT DATA
Data compression is a common requirement for most of the computerized applications. There are number of data compression algorithms, which are dedicated to compress different data formats. Even for a single data type the...
Mutant Generation for Aspect Oriented Programs
Testing of aspect oriented programs is a new programming paradigm. Many researchers had contributed their research in the field of testing AOP. Mutation testing is an emerging area of research in testing of aspect orient...
REGULATED RR-MAC PROTOCOL FOR WIRELESS SENSOR NETWORKS
This paper proposes RR-MAC, a medium-access control (MAC) protocol used for sensor networks. Wireless sensor networks uses battery power to sense the devices. It consists of spatially distributed autonomous sensors to mo...
A Sorting based Algorithm for the Construction of Balanced Search Tree Automatically for smaller elements and with minimum of one Rotation for Greater Elements from BST
Tree is a best data structure for data storage and retrieval of data whenever it could be accommodated in the memory. At the same time, this is true only when the tree is height-balanced and lesser depth from the root. I...
SV MACHINES FOR FUNCTION ESTIMATION COVERING QUADRATIC PROGRAMMING WITH LARGE DATA SETS USING FOR INTERIOR POINT ALGORITHM
Support Vector Machines (SVM) algorithms combine the simplicity and computational efficiency of linear algorithms, such as the perception algorithm or ridge regression, with the flexibility of nonlinear systems, like neu...